Monday, November 30, 2020

Threat Of Accounting Software In Reducing Job In Accounting Australia



Proposed research title

“The problems and issues of accounting software in accounting professions”


Research Background

The current research paper aims to provide with the information regarding the issues and challenges involved in accounting and accounting software. It further discusses and focuses on a bunch of solutions and strategies in order to solve and overcome the problems. The use of technology in accounting and bookkeeping is one of the most common and desired thing in the recent era. It has become easier to maintain the finance department in all the industries because of technology and its facilities. Just like the every other sectors, accounting is also going through a transformation while adopting new techniques of technological software (Alcouffe, et al., 2008). In the current time, the traditional techniques of accounting are being out formed and obsolete. The concepts of outdated financials, lack of information system, work based programming and remote-control systems are being excluded and the new innovative techniques of accounting are being incorporated and implemented. On contrary, technology is being an extremely fast tool to manage all the accounting tasks and it is being even more beneficial for the organizations and their future. The implementation of technology has brought a revolution in the business sector. The software like data security, the cloud, OCR tools, blockchain and xero technologies have taken the works of financing to a different level altogether and the organizations are being extremely benefitted with the implementation of such technologies. It is very difficult for the organizations if they fail to adapt the change of the industry. The workers and their practices will be left vulnerable and there are higher chances of the clients getting disappointed by the delayed and outdated work. Also, the market value and the brand values of such organizations will decrease much. 


In the recent times, the advanced technologies are developing every day and the organizations are adapting all the innovative techniques. In this time it is very unfortunate for the accountants who are being able to cope with the new techniques (Donaldson, et al., 2015). The competition in the market is increasing rapidly. Many new entrants are rising and being able to fit in the market. This is how, the growth of technology turns out to be a threat to some professionals at times. The innovative techniques of accounting systems are doing all the jobs by itself and not involving any human cooperation. This is being a severe threat to the accountant designation. Those who were holding the post ion the different companies are now losing their jobs and it is a serious threat.  The modern business organizations are implementing more advanced and affordable software instead of accounting professionals. This is how the professionals are getting insecure. 


The other very important challenge is the cyber security of the business. Accountants faces such challenges with accounting software. Implementing the highest scale of data security and a proper understanding towards information system is much needed nowadays. Because, hacking, stealing information and data are the serious issues of the organizations (Cavelty, 2007). It is observed and noticed that there are many cases of cyber-attacks occurring every year to some companies or the other. In the year 2017 there has been 400 cases of cybercrime in the businesses of Australia which has affected too many machines all over the world. 


There should be strategies of handling and managing cyber security in the innovative accounting systems. The issues of innovative accounting software are the financial loss of the business and the loss of work designations of the professionals. 


Research questions

How does technology give birth to the issues of the account professionals?

What are the threats of technology in accounting?

In which ways do the accountants adopt new technologies?

Is there anything to fear regarding accounting technology?

What are the ways of threat management?

How do the accountants be aware of the threats?


Research aim and objective

The following research assignment aims to find out the influence that the accounting technology creates along with the issues and the solutions and strategies to get over the threats. The other motifs could be;

Finding out the issues of the new accounting software

Listing out the strategies and tactics to overcome the challenges

Finding out the reason behind the fear of coping with new technologies of the account professionals

Finding out the information regarding spreading awareness to the professionals about the threats.

Keyword for literature review

Accounting technology issues

Problems of new accounting software

Confirming the threats of the new technologies

Raising cyber security in the organizations

Online accounting

Threats of accounting software


Publication Details of relevant articles for literature review

Sin, S., Reid, A. & Dahlgren, LO., 2011. The conceptions of work in accounting profession in the twenty-first century from the experiences if practitioners. Studies in Continuing Education, 33(2) , pp. 136-156.

Spalding, A.D. & Oddo, A., 2011. It’s time for principles-based accounting ethics. Journal of Business Ethics, 99(1), pp. 49-59.

Oler, D.K., Oler, M.J &Skouren, C.J., 2010. Characterizing accounting research. Accounting Horizons, 24(4), pp. 635-670.

Schroeder, A., Minocha, S. & Schneider, C. 2010. The strengths, weaknesses, opportunities and threats of using social software in higher and further education teaching and learning. Journal of computer assisted learning, 26(3), pp. 159-174.


Data collection plan

Various methods of data collections are used in different types of projects. It depends upon the type of assignment or research being done. It involves primary data collection or secondary data collection and in cases both the ways are implemented in the research procedure. In this research paper, the different data from the existing literature have been used as well has firsthand interviews of the business managers and owners (Kruskopf, et al., 2019). Both qualitative and quantitative research have been made in this dissertation. The qualitative research interacted with the documented data to understand every aspect of the threats of new accounting technologies in business.. On contrary, the quantitative research has calculated the statistical figures by investigating individuals in person. The survey included interviews of the business person to get the approximate result of the influence of technology. Precisely, the research is based on both primary and secondary research approach. 


Ethical consideration 

The ethical consideration of a research paper indicates the consent and credit of the assigned research papers and journals. It is important to use factual and with credit to be ethically right and respect the researcher. The involved research activities are done ethically (Alcouffe, et al., 2008). The current research has checked the originality and the authenticity of all the existing literatures involved with it. The survey involved in the paper ensures that the interviews have been conducted after taking consent of the individuals and all of them were adults (Meredith, 2007). The questionnaire has been published anonymously and there is no involvement of any sensitive issues such as religion, politics or anything of this sort. The entire research process have been kept consensual and private. The collected data have been kept safe and it can only be accessed by the researcher. 


Bibliography

Alcouffe, S., Berland, N. & Levant, Y., 2008. Actor-networks and the diffusion of management accounting innovations: A comparative study. Management Accounting Research, 19(1), pp. 1-17.

Cavelty, M. D., 2007. Cyber-security and threat politics: US efforts to secure the information age. s.l.:Routledge.

Donaldson, S., Siegel, S., Williams, C. K. & Aslam, A., 2015. Enterprise cybersecurity: how to build a successful cyberdefense program against advanced threats. s.l.:Apress.

Kruskopf, S. et al., 2019. Digital accounting: opportunities, threats and the human factor. ACRN Oxford Journal of Finance and Risk Perspectives, Volume 8, pp. 1-15.

Meredith, L., 2007. Scanning for market threats. Journal of Business & Industrial Marketing.




Tuesday, October 20, 2020

Project Initiation, Planning and Execution of Bruce Highway Upgrade Program

 1. Analysis of Success Factors           

The Bruce Highway Upgrade Program (QLD) would include the use of the construction management plan (Boyd, 2019). The completion of the works would be based on the usage of effective management and operations. The project would help to improve the situation of the long route travelling, and it would help in keeping the information function alignment. The success of the project would be based on the adequate facilities and design of the highway. The features of the road to be developed would help in enabling the proper management of conveyance and improving the situation of innovative management of work. The management of the traffic, using recycled materials, and the improved design of the highway would act like a success factor. They have been explained below,

Management of the traffic

The control of the traffic would help in considering the innovation management process. The traffic management would be achieved with the renovation of the highway road. The traffic management would help keep the information function utilisation. The traffic situation would be improved with the innovative management of operations (Higgins et al., 2018). The traffic improvement would be useful for keeping the data work usage. The traffic circumstance would be improved with the creative administration of activities.

Using recycled materials

The usage of the recycled materials would be identified for enduring highway control management operations. The recycled materials would be responsible for configuring the construction works without harming the resource environment (Scott, 2017). It is crucial for using sustainable practices while working for construction works.  The reused materials would be liable for arranging the development works without hurting the asset condition. It is essential for utilizing supportable practices while working for development works.

Improved design of highway

The innovative design of the road would help keep the information glued with the considered information confinement. The way would be enhanced with the practical consideration of innovation and management (Higgins et al., 2018). The design of the way would be based on the evaluation of the principles would be found on the usage of innovation and development. The highway would be improved with the influential thought of the advancement with design principles. The plan of the interstate would be founded on the assessment of the standards with the utilization of promotion and improvement.


2. Analysis of Fall Factors

The issue of the traffic identified in the Bruce Highway Upgrade Program would result in considering the flaw issue process. The traffic issue would be achieved with the renovation of the highway road. The traffic issue would be resentful for keeping the flow of traffic unobstructed. The traffic situation would be improved with the flaw issue of operations (Scott, 2017). The usage of the volatile materials would be identified for enduring the highway control issue operations. The explosive materials would be responsible for configuring the construction works without harming the resource environment. It is crucial for using sustainable practices while working for construction works (Higgins et al., 2018).  The flawed design of the highway would be resulted for keeping the information glued with the considered information confinement. The road would be improved with the practical consideration of the innovation and issue. The design of the road would be based on the evaluation of the principles would be found on the usage of change and development.

3. What are the Ethical Considerations of Bruce Highway Upgrade Program?

The term Ethical Considerations can be referred to a set of moral norms which are required to be maintained in an organization for the improvement of the business (MacKay, 2016). The employees, along with other staff, are required to follow the rules in terms of making the organization sustainable. The organizational leaders are the significant authority who is needed to keep an eye on the activities of the employees. The project of Bruce Highway Upgrade Program (QLD) also maintained some basic ethical norms that have been beneficial for the successful end of the project.

Role of the leader: the leaders are responsible for making the employees influenced and motivated towards performing their job roles. The leaders must have a brief knowledge regarding the set of ethical norms and helps the employees to follow it (Stazyk & Davis, 2015). Ethical considerations involve the idea that efficient leaders would be capable of making the employees convinced in terms of maintaining the rules.

Ethics policy: the ethical norms should be written in simple and clear words that every employee can be able to understand it (Stazyk & Davis, 2015). The rules would be made based on organizational culture and ethics. There should be no partiality in the rules and regulations of the organization. The Bruce Highway Upgrade Program (QLD) project has followed some ethical considerations to gain success.

Performance monitoring: the ethical considerations involve the idea of monitor the performance of the employees in terms of improving the organizational culture (Stazyk & Davis, 2015). It will be the duty of the leader to watch and observe the employees and their actions if they are following the norms or not. Strict action s should be taken the employees if they are not maintaining the rules.

Prohibited ethical violation: it is the responsibility of the leader to take such strong action against any employee if he/she breaks the rules of the organization or do not maintain the ethical norms. The organization’s ethical considerations portrays its culture and beliefs. Hence, it is required to maintain the rules without any violation that can harm the reputation of the organization. The Bruce Highway Upgrade Program (QLD) has been successful in maintaining these factors and made the project successful and sustainable.

Reference list

Boyd, S. T. E. V. E. N. (2019). Designing a rubric to categorise projects of significance to the Sunshine Coast Region. Bruce Highway Upgrade Program In Proceedings of the 25th Annual Pacific-Rim Real Estate Society Conference. Pacific Rim Real Estate Society (PRRES).

Higgins, A., McFallan, S., Marinoni, O., McKeown, A., Bruce, C., Chilcott, C., and Pinkard, L. (2018). Informing transport infrastructure investments using TraNSIT: A case study for Australian agriculture and forestry. Computers and electronics in agriculture154, 187-203.

Higgins, A., McFallan, S., McKeown, A., Bruce, C., and Chilcott, C. (2018). Informing major government programs for rural transport infrastructure in northern Australia. The Rangeland Journal40(4), 341-351.

MacKay, N. (2016). Ethical Considerations. Bruce Highway Upgrade Program In Curating Oral Histories (pp. 61-72). Routledge.

Scott, S. (2017). Conservation of Hairy Hazelwood: A propagation and transplantation experience. Australasian Plant Conservation: Journal of the Australian Network for Plant Conservation26(2), 11.

Stazyk, E. C., and Davis, R. S. (2015). Taking the ‘high road’: Does public service motivation alter ethical decision making processes? Bruce Highway Upgrade Program Public Administration, 93(3), 627-645.

 

 

 

Infographic Poster

Wednesday, September 09, 2020

High DA Backlinking Websites List

 

Any SEO specialist or even beginner will tell you that backlinks are one of the most important things for a high ranking web page, and it true. However, there is a lot more to it than just gathering up a vast number of backlinks. 
 
Backlinks are the like recommendations amongst the internet websites, the more number of recommendations you have the greater will be your popularity, a.k.a. rankings. Furthermore, there are two key aspects of getting backlinks that you must always keep in mind, which are Quality back links and Quantity of the backlinks. 
 
Quantity of the backlinks refer to the number of backlinks that your website or webpage gets from different website on the internet. The greater the number of backlinks the great is the chances of ranking higher on the Google SERPs.
 
However, gathering up backlinks from poorly ranked websites other sources might come with a drawback as well. Having a large number of backlinks from poorly ranked websites with low DA can increase your spam score and might even decrease your ranking. 
 
The other parameter related to getting backlinks is Quality. A quality backlink refers to a link which leads to your website or webpage, from a highly ranked website with a high DA. A single backlink from a high authority domain can help your webpage a lot more than numerous other backlinks from poorly ranked websites. 
 
Think of it like a recommendation for a job, lets you, you want a job at your friend’s firm, now if your friend works in the cafeteria at that firm then him giving your recommendation might not mean much to the employers, however, if your friend works in the management position or a supervisor, then him putting in a good word might go a long way for you. Similarly, a backlink from a high DA website, will help you rank higher on SERPs.
 
Therefore, while planning your next digital marketing strategy, you need to keep these points in mind and aim for getting a backlink form website having DA of 70 or higher. Always check the quality and DA of the website form where you’re getting backlinks. 
 
However, getting a backlink from a DA website may not come as easy. Since the website having a high DA has more value for the backlinks they give out, the competition becomes that much tougher. The success will be quite slow, but as you move up and keep building good quality backlinks you will get the hang of what more high ranking website need and how to approach them. 
 
To help you get started, here is a list of some websites with high DA that you can approach for getting backlinks. Each backlink from a website in this link will help greatly in increasing the SERP ranking of your webpage.
 

Backlink Websites

https://canvas.ubc.ca/eportfolios/4695
https://www.geeksforgeeks.org/machine-learning-role-in-business-growth-and-development/
http://cs.brown.edu/~spr/research/s6.html
http://staff.um.edu.mt/jskl1/simweb/jssim/index.html
https://www.cs.purdue.edu/homes/dec/essay.escape.html
https://answers.microsoft.com/en-us/profile/df13ea4f-db1c-4933-bf0b-895286efcdb0?sort=LastReplyDate&dir=Desc&tab=Threads&forum=allcategories&meta=&status=&mod=&advFil=&postedAfter=undefined&postedBefore=undefined&threadType=All&page=1
https://forums.aws.amazon.com/thread.jspa?messageID=953295
https://profile.hatena.ne.jp/thomassmith3432/profile
http://flgclassifieds.cce.cornell.edu/author/thomassmith3432/
https://www.twitch.tv/thomassmith3432
http://gisdata.scag.ca.gov/Lists/AccessRequests/DispForm.aspx?ID=9141
https://www.ultimate-guitar.com/u/thomassmith3432
https://www.business.com/advice/member/p/thomas-smith-7/
https://comicvine.gamespot.com/profile/thomassmith3432/about-me/
https://www.liveinternet.ru/users/thomassmith3432/blog#post474127205
https://my.stuff.co.nz/profile/thomassmith3432
https://www.reverbnation.com/thomas354
https://giphy.com/channel/thomassmith3432
https://web.ask.byu.edu/users/471/thomas-smith/
https://www.curbed.com/users/thomassmith3432
https://respostas.sebrae.com.br/como-vender-para-o-governo-cliente-potencial-2/#comment-21215
https://www.buzzfeed.com/robbie561
http://maten.sakura.ne.jp/index.php/view/10642221
https://forum.lowyat.net/index.php?showuser=1117396
https://anchor.fm/robbie-simons
https://www.metal-archives.com/users/Robbie561
https://www.fanfiction.net/~thomassmith3432
https://pbase.com/thomassmith3432/profile
https://www.codecademy.com/profiles/thomasSmith7581818133
https://www.redbubble.com/people/thomassmith3432/shop?asc=u
https://coub.com/thomassmith3432/reposts
https://thomassmith.dreamwidth.org/profile
https://pa2010.cdms.westernsydney.edu.au/ParentalCatalyst/viewtopic.php?f=26&t=3189&p=4462#p4462
https://500px.com/p/thomassmith3432?view=photos
https://qiita.com/thomassmith3432
https://www.eater.com/users/thomassmith3432
http://cs.astronomy.com/members/thomassmith3432/default.aspx
https://digital.hbs.edu/platform-rctom/author/thomas-smith/
https://www.nairaland.com/thomassmith
https://trabajo.merca20.com/author/thomassmith3432/
https://peatix.com/user/6460996/view

Monday, July 20, 2020

Project Management Assignment Weekly Portfolio Of Learning Outcomes


Introduction and summary of outcomes
The project management assignment has dealt with the effective identification of the respective analysis for the comprehensive project management study. The portfolio comprehends the learning and qualification of the students on handling the raised issues through their comprehension with respect to the investigation materials. In this investigation, the whole learning results of the students would be displayed in a solidified portfolio structure. Learning results of ten weeks would be depicted through this examination. It tends to be introduced to the group of spectators in a portfolio structure. The accompanying segment would feature the all over synopsis of consistently learning result. It has been seen that a project manager is required to note down each result of the students and give it the type of a structure.

Week #
Summary
#1 The project management's system thinking would be taught in the 1st week of study. The connection of the system thinking with the program manager and the portfolio manager would likewise be featured in the primary week with the arrangement of SEBoK.
#2 The students would be acquainted with various types of instruments alongside methods of the system thinking in project management as far as taking care of many brought issues up in the proposed project in the 2nd week.
#3 The connection of the system building and its effects on the project management would be examined in the 3rd week. The hugeness of system building would likewise be depicted as per project cases that are intended to be evaluated.
#4 The students would be taught a short understanding on how the manager of a project can have the option to arrange an ideal project with the arrangement of the ideas alongside approaches of system building in the 4th week.
#5 The centrality and vitality of choosing the fitting and important application systems of project management lined up with the acknowledgment of the proposed project would be taught in the 5th week.
#6 The discourse on how the learning management mentioned in this project management assignment alongside basic leadership procedure are being influenced through the solid contribution of the chose application systems of project management. It would be dealt in the 6th week.
#7 Over a project and its life cycle, a few electronic alongside manual application systems of project management have been utilized. It would be taught in the 7th week. The favourable circumstances just as the hindrances of these application systems as per every territory of project management lined up with the internal examination would be the learning result.
#8 How the project managers can be qualified for checking the presentation of the project and mastermind the necessary changes in the project as per the application systems of project management is the learning result of 8th week.
#9 The proposition on how the execution of productive projects are being done in a few enterprises through the association of appropriate application systems of project management in the 9th week.
#10&11 Both of the 10th and 11th week would be exhausted for the contemporary advancements in regards to the use of composed application systems of project management.

Learning outcomes
LO1
Summary: The connection of the system thinking mentioned in this project management assignment with the program manager and the portfolio manager was additionally the learning result of this current week. It incorporated the change of SEBoK for having an unmistakable prospect in regards to the point (Al-Mamary, Shamsuddin and Aziati, (2013). Learning result of the week 1 was the comprehension of project management's system thinking to the students. For picking up the learning result, the utilized investigation materials were the prologue to SEBoK. 'SEBoK clients and client' was likewise a piece of this current week. 'Parts 2.1; 2.6 - 2.8; 2.21' of Kerzner's book of SEBoK were pursued to give better prospect and information with respect to the subject (Kerzner, 2013). Project management's learning territory and the hugeness of system designing were likewise incorporated the examination material of the principal week. A contextual analysis of 'Boss Counsel's report) has likewise been proposed in this week as an investigation material which would clear the disarrays of the students if there should arise an occurrence of any question.
Evidence
“‘Kerzner (2013) Chapters 2.1; 2.6 - 2.8; 2.21;’ ‘AS/NZS 15288:2015 Introduction; ‘AS ISO 21504:2016 Project, programme and portfolio management—Guidance on portfolio management;’ Moodle website”

LO2
Summary: For accomplishing the learning result, the students were solicited to modify the examination materials from the most recent week. Learning result of week 2 mentioned in this Project management assignment included various types of instruments alongside strategies of the system thinking in project management as far as tackling many brought issues up in the proposed project. 'Sections 2.1; 2.6 - 2.8; 2.21' of Kerzner's book of SEBoK were pursued to give better prospect and learning with respect to the point (Kerzner, 2013). What's more, they were approached to pick up learning on management system in regards to portfolio, program and project management for having a superior comprehension with respect to the point. Project management's learning region and the centrality of system designing were additionally incorporated the investigation material of the subsequent week.
Evidence
“Kerzner (2013) ‘Chapters 2.1; 2.6 - 2.8; 2.21’; ‘AS/NZS 15288:2015 Introduction; ’AS ISO 21504:2016 Project, programme and portfolio management—Guidance on portfolio management; ’Chief Counsel Report - Chapter 5 (PDF 700KB)’Moodle website”

LO3
Summary: The essentialness of system designing has additionally been depicted as per project cases that are intended to be unravelled. Learning result of week 3 incorporated the connection of the system designing and its effects on the project management. At that point the students were solicited to peruse the section 2 from SEBoK which incorporated the system building's establishments. The investigation materials of this current week initially incorporated the modification of the earlier weeks. Section 6 was incorporated into this week which comprised of the orders with respect to the system thinking. The learning zone included basics of system designing, system science, systems thinking and how the systems can be spoken to with model (Al-Mamary, Shamsuddin and Aziati, (2013). The learning region of section 6 included system designing alongside mechanical building and strength designing. The Chapters 2.1; 2.6 - 2.8; 2.21' of Kerzner's book of SEBoK were pursued to give better prospect and learning in regards to the subject (Kerzner, 2013). A contextual analysis on project management has been assessed in this week for understanding the absence of shared data that has been imperiled the 'ESA Cassini/strategic Huyzen to Saturn or Nasa'. Alongside that, section 7 which comprised of the usage of system thinking in the project through the system designing, was additionally incorporated into the investigation materials of this current week.
Evidence
“Kerzner (2013) Chapters 15.16- 15.23; 23.5-23.6; AS/NZS 15288:2015 Chapter 6.3-6.4; Raymond L., & Bergeron F., (2008) & Project Management Information systems: An empirical study of their impact on project managers and project success
AS ISO 21504:2016 SWEBOK V3 Guide. Web Sites SAP, Oracle Primavera, IBM Maximo & BPM Microsoft Project.”

LO4
Summary: The students participated in this Project management assignment were first proposed to have an update of the learning results of the earlier weeks. Learning result of week 4 incorporated a concise comprehension on how the manager of a project can have the option to sort out an ideal project with the arrangement of the ideas alongside techniques of system designing. Other than that, section 5 was incorporated into the examination material that comprised the enablement of the system building. At that point section 2 of SEBoK was perused out in the class which incorporated the parts of establishments that is adjusted to system designing. The article of Al-Mamary Y.H., Shamsuddin An, and Aziati N., (2013) likewise helped the students to pick up learning (Al-Mamary, Shamsuddin and Aziati, (2013). 'Sections 1.21; 2.16-2.18; 17.18' of Kerzner's book was additionally incorporated into the investigation material (Kerzner, 2013).
Evidence
“Kerzner (2013) Chapters 15.16- 15.23; 23.5-23.6; AS/NZS 15288:2015 Chapter 6.3-6.4; Raymond L., & Bergeron F., (2008) & Project Management Information systems: An empirical study of their impact on project managers and project success
AS ISO 21504:2016 SWEBOK V3 Guide. Web Sites SAP, Oracle Primavera, IBM Maximo & BPM Microsoft Project.”

LO5
Summary:  The learning zone of system building and system management mentioned in this Project management assignment has been featured as an examination material in this week lined up with SEBoK and its whole life cycle process. Programming designing and its angles additionally have been examined. 'Sections 15.16- 15.23; 23.5-23.6;' of Kerzner's book has been examined in this week as an investigation material. Learning result of week 5 incorporated the essentialness and vitality of choosing the suitable and significant application systems of project management lined up with the acknowledgment of the proposed project. Raymond and Bergeron's project management book likewise has been considered as the examination material of the week. Alongside that, 'AS/NZS 15288:2015 Chapter 6.3-6.4;' has additionally been read in the class for building up the comprehension. Sites, for example, 'SAP, Microsoft project, Oracle Primavera and IBM Maximo and BPM' have been visited to gather bona fide data with respect to the subject (Al-Mamary, Shamsuddin and Aziati, (2013). The models on the existence cycles of the information zone of system building and system designing have likewise been examined in this week alongside its ideas and 'definitions'.
Evidence
“Kerzner (2013) Chapters 15.16- 15.23; 23.5-23.6; AS/NZS 15288:2015 Chapter 6.3-6.4; Raymond L., & Bergeron F., (2008) & Project Management Information systems: An empirical study of their impact on project managers and project success
AS ISO 21504:2016 SWEBOK V3 Guide. Web Sites SAP, Oracle Primavera, IBM Maximo & BPM Microsoft Project.”

LO6
Summary: Part 23 of Kerzner's book has helped the students to comprehend the criticalness of system designing and its perspectives on genuine models. The students were solicited to re-examine the taking in results from the earlier week. Learning result of week 6 incorporated the worry in regards to the dialog on how the information management alongside basic leadership procedure are being influenced through the solid contribution of the chose application systems of project management. Organization of system alongside the use of system has been clarified to the students. 'System designing management' was additionally an indispensable piece of the current week's investigation material. Alongside that, the guidelines of 'systems building' was assessed in the class for giving a superior thought with respect to the examination material to the students. The learning zone of this current week additionally included 'item management and administration life management'. System acknowledgment has been considered as an information region of the investigation materials of this current week.
Evidence
“‘AS/NZS 15288:2015 Annex E’‘AS ISO 21504:2016’ Web Sites ‘YouTube: What is Portfolio Management vs. Project Management?’”

LO7
Summary: Section 4 of SEBoK has been perused out this week which incorporated the viewpoints and uses of the system designing. The favorable circumstances just as the weaknesses of these application systems as per every territory of project management lined up with the internal correlation would be the learning result of the seventh week. Learning result of week 7 discussed in this project management assignment incorporated the way that over a project and its life cycle, a few electronic alongside manual application systems of project management have been utilized.
Evidence
“‘SEBoK Part 4: Applications of Systems Engineering; ’AS/NZS 15288:2015 Annex F & G’‘AS ISO 21504:2016 BP News Wrap-up’”

LO8
Summary: Other than that, part 7 was likewise talked about with respect to the comprehension of portfolio management. PMI's book was perused out in class for giving an unmistakable origination with respect to 'program management standard' which was in the eighth part of the third release. Learning result of week 8 included how the project managers can be qualified for checking the presentation of the project and orchestrate the necessary changes in the project as per the application systems of project management.
Evidence
‘PMI (2013) The Standard for Program Management -- Third Edition Chapter 7&8’;

LO9
Summary: Week 9 mentioned in this
project management assignment didn't have a specific report material as this week was viewed as the amendment 7 day stretch of the learning results of the earlier weeks.
Evidence
No such evidence

LO10&11
Summary: Knowledge producer likewise has been utilized for the current week to give appropriate direction. Section 1, 2, 13 and 15 of Sterman's book was utilized as an investigation material this week for having a superior finish of the whole course. Learning result of week 10 and 11 included exchange with respect to contemporary improvements in regards to the use of sorted out application systems of project management. Alongside that, INCOSE has additionally been utilized for the current week.
Evidence
  • ‘Sterman Chapters 1, 2, 13 and 15;’
  • ‘Insight Maker’
  • ‘INCOSE’
Discussion and conclusion
The system thinking is directly related with the emancipation of the effective influence of the project, program, and portfolio manager. The development of the effective and supportive deployment of the activities. The system thinking tools of designing, creative evaluation, and it can endure the usability of successful information development. The tools can help in enabling of the eased management process. The relevant assess to the system engineering would take care of the improved project management process and development. The enduring of the project case implication can also take care of the improved facility development. The system engineering management can take care of the effective process development for the project. The consideration of the program management can also take care of the effective implication development. The selection of the project management facilities can endure the usage of the successful and effective formation of the works for supporting the external and internal objectives of the project. The project management application systems can help in identifying the smart deployment of the operations for taking care of the knowledge and decision making process. The various advantages of the manual and automatic project include the step by step development of the facilities supporting the project works. The various advantages and disadvantages of the manual and automatic project include onetime planning and execution strategy development. The process can help in enabling the usage of the smart facility for aligning the eased development and completion with the effective designing principles. The SDLC can be effectively used for the successful execution of the project works supporting the smart alignment of the operations.

References
Al-Mamary Y.H., Shamsuddin A, & Aziati N., (2013) “The Impact of Management Information Systems Adoption in Managerial Decision Making: A Review”
Raymond L., & Bergeron F., (2008) Project management assignment Project Management Information systems: “An empirical study of their impact on project managers and project success”

Monday, July 13, 2020

Communication network assignment


Answer-1:
Here to complete this task provided in this Communication network assignment we need to convert given binary stream into an analog waveform using the various modulation technique. The analog modulation is used in transmission of analog baseband signals. There are various modulation techniques are used for the analog modulation like amplitude modulation, frequency modulation, and phase modulation. Here these all techniques are used for the modulation of binary data “110101”. Hence by using the various frequency level of carrier signal the data would be modulated and then sends it towards the destination. So the modulation process by using the various frequency and modulation technique is shown in below screenshot:

Two-level Amplitude Shift Keying

Two-level Frequency Shift Keying


Two-level Phase Shift Keying


Differential Phase Shift Keying


Four level Amplitude Shift Keying


Four level Amplitude Shift Keying


Eight level Amplitude Shift Keying


Answer – 2:
The multiple frequency shifts keying modulation process is used to transmit information signals over the network. The MFSK is required two or more frequency signals for the modulation of information signal. MFSK standard state working is on the basis of narrow tone or low-frequency modulation methodology. While we using MFSK modulation for the analog signal at that time it gives modulated signal as high frequency instead of positive bits or 1’s and it provides the lower frequency signal instead of negative bits or 0’s. By using the MFKS technique it can able to provide the various features like lower error rate, high noise rejection, multipath rejection, and better sensitivity, etc. There are some drawbacks of MFSK which makes complex tuning, offset value of transmission and receiver is low, etc.

Hence after discussion of the MFSK modulation technique in this Communication network assignment here we compute some modulated signal for the four-bit data combination. While us using the four-bit data combination then we get 16 different possibilities of data transmission over the network.  As now as per the requirement MFSK modulation for the Fc = 1000 KHz, Fd = 50 KHz, and M = 16 is shown by below screenshot:




Answer -3:
There was amplitude modulation or frequency modulation is methodology is used as a modulation technique in this task. While the amplitude modulation is done then the modulating signal parameters change with respect to the amplitude of the signal. The frequency modulation techniques change the frequency parameters during the modulation. The below screenshots provided in this Communication network assignment shows amplitude modulation and frequency modulation of given signal:

Amplitude modulation:

Frequency modulation:

Answer – 4:
The QAM process is the same as the superimposing process of ASK modulation. There is two types of QAM technique present like M-QAM and standard QAM. The M-QAM provides much better results than standard QAM but as per the simplicity of standard QAM it was highly useful in communication. In M-QAM methodology M is used to represent the number of error bits detection in network. Usually M-bits are achieved by doing the converting process of data stream into Gray Code. The Karnaugh Maps is used to represent the QAM constellation output. Below we mention the calculation process to generate 16-QAM constellation.  

Now here to generate the 16-QAM there is 4 different amplitude level and 4 different phase level is used. So for that used amplitude and phase level values are {-3, -1, 1, 3}. Hence to draw the 16-QAM with the 4 ASK and PSK there is 4-bit K-map is used which is mention in below table:

AB/CD
-3
-1
1
3
-3
0000
0001
0011
0010
-1
0100
0101
0111
0110
1
1100
1101
1111
1110
3
1000
1001
1011
1010

Now as per the theory of array indication there is a need to relate the value of K-map with the effective value of array. So the array table with K-map value is as per below:

Number
Array value in binary
Array value
0
0000
-3-3j
1
0001
-3-1j
2
0010
-3+3j
3
0011
-3+1j
4
0100
-1-3j
5
0101
-1-1j
6
0110
-1+3j
7
0111
-1+1j
8
1000
+3-3j
9
1001
+3-1j
10
1010
+3+3j
11
1011
+3+1j
12
1100
+1-3j
13
1101
+1-1j
14
1110
+1+3j
15
1111
+1+1j

Once the Array table is created then it is required to plot the value of the binary related to the array value in the graph. So that the below screenshot shows the graph of 16-QAM constellation:


Answer – 5:
The signal transmitted over the communication network would be received with an error at the receiver due to some noise signal. While the information signal is coming with a one-bit error then it completely lose data because it changes all information in wrong direction. So that it is necessary to check the error in receiving signals. There are various techniques are used for the error check in the network like CRC, hamming code, etc. here we discuss the CRC error detection method:


The cyclic redundancy check method is work on the principle of parity bit generalization. In this methodology there are parity bit was attached at the end of information bit string by sender and at the receiver end these bit are used for the verification of data integrity. The CRC is used for the short-range of an information signal to check the error like there is maximum 12000 bits limitation for the error check. There are various kinds of errors are detected by the CRC like singe bit error and burst error. The CRC parity implementation and error checking process over the network is mention by below screenshot:

The above snapshot provides the details information about the CRC error checking code at the sender and receiver side. Now as per the screenshot first data with some 0 bits are divided with help of CRC code pattern. Once the binary division process is complete then the reminder bits are known as per CRC bits or parity bits. After that the data will send in the pattern of data information and then CRC bits.

Now at the receiver end, the data with CRC bit would be divided with same divider bits and check reminder bits. After completion of the division process if reminder is zero then data would be accepted and reminder is not zero then data would be rejected by receiver. So these are steps that are required to do for error check using CRC code.

Answer – 6:
Now as per the above discussion of the CRC check methodology in a task we check error of transmitted data or integrity of data. So for that here given information bits are 111010110 and code pattern is 101110. The CRC check calculation is shown by the below screenshot:


Now after the completion of CRC calculation at the sender side the transmitted data over the internet is 1110101101100. Now after that at receiver end CRC calculation is as per below screenshot:


So after completion of the calculation, the remainder of division is 1010. So we can say that the data should have some error bits and so receiver rejects this information data.

Answer – 7:
The direct sequence spread spectrum is used for data transmission over various bandwidth of transmitting waves. The process of data signal multiplication is completed through a chip code data stream that is generated via XOR operation. The chip-code data stream is able to represent the value of chips passing per second. The transmitted data signal combination of baseband carrier and information signal should provide wider bandwidth than original data stream. Hence at the receiver side there are CDMA demodulation process is occurring and then multiplying with the spread spectrum original signal will generated. These are some steps covered in DSSS. Now as per the given information below in this Communication network assignment we generate transmitted signal using DSSS:

Input: 101            locally generated PN bit-stream: 011011010110                  T=4Tc


Answer – 8:
The cellular network of any service provider needs to use the hexagonal cell structure for communication because as per the arrangement of hexagonal cell structure can be laid next to each other and there is no additional gap between two cells. Hence without making the gap or overlapping in structure it should able to cover all cellular networks. In hexagonal cell structure one base station was implemented the center cell structure and besides cell are able to communicate with separate frequency for each. Another base station configuration is as same as first one. There are six microcells are connected with the one base station. Now when we use circle or square cell structure at that time it is difficult to arrange the same design. The cell structure of the circle or square cell structure generates some overlapping or gap between two cells. So for that in gap area user cannot get network connectivity and in the case of the overlapping there are bandwidth migration is occurring and it is called noise. Now in square cell structure at the edge of cell user cannot get proper bandwidth due to large area or if we allocate sufficient bandwidth then cost of transmission would be increased. So for that we can say that hexagonal cell structure gives better output then circle and square cell structure. Below images shows the cell structure for hexagonal, circle and square cells:

Hexagonal cell structure:


Circle cell structure:

Square cell structure:

Reference:
Constructing a rectangular constellation for 16-QAM. (2015, June 4). Retrieved from https://www.gaussianwaves.com/2012/10/constructing-a-rectangular-constellation-for-16-qam/
DSSS. (n.d.). Retrieved from https://www.sciencedirect.com/topics/engineering/direct-sequence-spread-spectrum

Error Detection in Computer Networks. (2019, August 12). Retrieved from https://www.geeksforgeeks.org/error-detection-in-computer-networks/
Modulation, Analog modulation, Digital modulation, AM, FM, PM, ASK, FSK, PSK explained. 

(n.d.). Communication network assignment Retrieved from http://www.equestionanswers.com/notes/modulation-analog-digital.php

Spread Spectrum Modulation. (n.d.). Retrieved from https://www.tutorialspoint.com/digital_communication/digital_communication_spread_spectrum_modulation.htm

Thakur, D. (n.d.). Cyclic Redundancy Check (CRC). Retrieved from http://ecomputernotes.com/computernetworkingnotes/communication-networks/cyclic-redundancy-check